Results 1  10
of
448,535
Security of the private quantum channel
, 2002
"... Abstract. We extensively discuss the problem of encryption of quantum information. We present an attack on the private quantum channel which applies when partial classical description of the cipher text is known (the knownciphertext attack) and show how to avoid this situation. The quantum analogue ..."
Abstract
 Add to MetaCart
Abstract. We extensively discuss the problem of encryption of quantum information. We present an attack on the private quantum channel which applies when partial classical description of the cipher text is known (the knownciphertext attack) and show how to avoid this situation. The quantum
Private Quantum Channels
 Proceedings of the 41st Annual Symposium on Foundations of Computer Science
, 2000
"... We investigate how a classical private key can be used by two players, connected by an insecure oneway quantum channel, to perform private communication of quantum information. In particular we show that in order to transmit n qubits privately, 2n bits of shared private key are necessary and sucien ..."
Abstract

Cited by 54 (0 self)
 Add to MetaCart
We investigate how a classical private key can be used by two players, connected by an insecure oneway quantum channel, to perform private communication of quantum information. In particular we show that in order to transmit n qubits privately, 2n bits of shared private key are necessary
Limits and restrictions of private quantum channel
, 2005
"... We study private quantum channels on a single qubit, which encrypt given set of plaintext states P. Specifically, we determine all achievable states ρ (0) (average output of encryption) and for each particular set P we determine the entropy of the key necessary and sufficient to encrypt this set. It ..."
Abstract

Cited by 2 (1 self)
 Add to MetaCart
We study private quantum channels on a single qubit, which encrypt given set of plaintext states P. Specifically, we determine all achievable states ρ (0) (average output of encryption) and for each particular set P we determine the entropy of the key necessary and sufficient to encrypt this set
Resource requirements of private quantum channels
, 2006
"... Shannon [11, 12] in celebrated works had shown that n bits of shared key is necessary and sufficient to transmit nbit classical information in an informationtheoretically secure way. Ambainis, Mosca, Tapp and de Wolf in [1] considered a more general setting, referred to as Private quantum channels ..."
Abstract

Cited by 2 (1 self)
 Add to MetaCart
Shannon [11, 12] in celebrated works had shown that n bits of shared key is necessary and sufficient to transmit nbit classical information in an informationtheoretically secure way. Ambainis, Mosca, Tapp and de Wolf in [1] considered a more general setting, referred to as Private quantum
PRIVATE QUANTUM CHANNELS, CONDITIONAL EXPECTATIONS, AND TRACE VECTORS
"... Abstract. Private quantum channels are the quantum analogue of the classical onetime pad. Conditional expectations and trace vectors are notions that have been part of operator algebra theory for several decades. We show that the theory of conditional expectations and trace vectors is intimately r ..."
Abstract
 Add to MetaCart
Abstract. Private quantum channels are the quantum analogue of the classical onetime pad. Conditional expectations and trace vectors are notions that have been part of operator algebra theory for several decades. We show that the theory of conditional expectations and trace vectors is intimately
Private quantum channels and the cost of randomizing quantum information,” (22Mar00) preprint quantph/0003101
, 2000
"... We investigate how a classical private key can be used by two players, connected by an insecure oneway quantum channel, to perform private communication of quantum information. In particular we show that in order to transmit n qubits privately, 2n bits of shared private key are necessary and suffic ..."
Abstract

Cited by 5 (0 self)
 Add to MetaCart
We investigate how a classical private key can be used by two players, connected by an insecure oneway quantum channel, to perform private communication of quantum information. In particular we show that in order to transmit n qubits privately, 2n bits of shared private key are necessary
Teleporting an Unknown Quantum State via Dual Classical and EPR Channels
, 1993
"... An unknown quantum state jOEi can be disassembled into, then later reconstructed from, purely classical information and purely nonclassical EPR correlations. To do so the sender, "Alice," and the receiver, "Bob," must prearrange the sharing of an EPRcorrelated pair of particles. ..."
Abstract

Cited by 648 (22 self)
 Add to MetaCart
An unknown quantum state jOEi can be disassembled into, then later reconstructed from, purely classical information and purely nonclassical EPR correlations. To do so the sender, "Alice," and the receiver, "Bob," must prearrange the sharing of an EPRcorrelated pair of particles
Simulating Physics with Computers
 SIAM Journal on Computing
, 1982
"... A digital computer is generally believed to be an efficient universal computing device; that is, it is believed able to simulate any physical computing device with an increase in computation time of at most a polynomial factor. This may not be true when quantum mechanics is taken into consideration. ..."
Abstract

Cited by 601 (1 self)
 Add to MetaCart
A digital computer is generally believed to be an efficient universal computing device; that is, it is believed able to simulate any physical computing device with an increase in computation time of at most a polynomial factor. This may not be true when quantum mechanics is taken into consideration
Results 1  10
of
448,535